Sciweavers

143 search results - page 24 / 29
» Hash, Displace, and Compress
Sort
View
CCS
2008
ACM
13 years 9 months ago
HMAC is a randomness extractor and applications to TLS
In this paper, we study the security of a practical randomness extractor and its application in the tls standard. Randomness extraction is the first stage of key derivation functi...
Pierre-Alain Fouque, David Pointcheval, Séb...
BC
2004
72views more  BC 2004»
13 years 7 months ago
A simple translation in cortical log-coordinates may account for the pattern of saccadic localization errors
During saccadic eye movements, the visual world shifts rapidly across the retina. Perceptual continuity is thought to be maintained by active neural mechanisms that compensate for ...
Rufin van Rullen
ECCC
2007
122views more  ECCC 2007»
13 years 7 months ago
Infeasibility of Instance Compression and Succinct PCPs for NP
The OR-SAT problem asks, given Boolean formulae φ1, . . . , φm each of size at most n, whether at least one of the φi’s is satisfiable. We show that there is no reduction fr...
Lance Fortnow, Rahul Santhanam
ICIP
2004
IEEE
14 years 9 months ago
Wyner-ziv video coding with hash-based motion compensation at the receiver
In current interframe video compression systems, the encoder performs predictive coding to exploit the similarities of successive frames. The Wyner-Ziv Theorem on source coding wi...
Anne Aaron, Shantanu Rane, Bernd Girod
PKC
2010
Springer
150views Cryptology» more  PKC 2010»
13 years 11 months ago
Security of Encryption Schemes in Weakened Random Oracle Models
Liskov proposed several weakened versions of the random oracle model, called weakened random oracle models (WROMs), to capture the vulnerability of ideal compression functions, wh...
Akinori Kawachi, Akira Numayama, Keisuke Tanaka, K...